
Cybersecurity A
Quiz by JASON CANFIELD
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
101 questions
Show answers
- Q1A system that can distinguish between a human and an automated program.CAPTCHA30s
- Q2See imageSTANDS FOR: Completely Automated Public Turing test to tell Computers and30s
- Q3See imageHumans Apart30s
- Q4A malicious program disguised as legitimate software. Users intentionally install a Trojan HorseTrojan Horse30s
- Q5A worm is spread on it's own and does not need human interaction, a virus is spread through humans and needs them to spread.Difference between worm and virus30s
- Q6Similar to a virus except that a worm does not need a human to spread, rather it can replicate on its own to infect other computers.Worms30s
- Q7Practice of sending fraudulent emails that appear to be from legitimatePhishing30s
- Q8See imagecompanies with the intent to induce people to share sensitive information,30s
- Q9See imagesuch as passwords and credit card numbers30s
- Q10Irrelevant or inappropriate messaging sent through email to a large number ofSpam30s
- Q11See imagerecipients; also known as junk mail.30s
- Q12The last segment of a web address; it follows immediately after the last "dot"Top-Level Domain30s
- Q13See imagesymbol (.com, .net, .org, .gov)30s
- Q14The art of manipulating people so they give up confidential information, whichSocial Engineering30s
- Q15See imageincludes your passwords, bank information, or access to your computer30s